"~BD~" <~BD~@nomail.afraid.com> wrote in message
news:naidnfOxXf5mnIXTnZ2dnUVZ8jidnZ2d@bt.com...
> Dustin Cook wrote:
>> "Jenn"<nope@nowayatno.howanyday> wrote in
>> news:iv8bdg$41n$1@dont-email.me:
>>
>>> Dustin wrote:
>>>> "Jenn"<nope@nowayatno.howanyday> wrote in
>>>> news:iv5ig4$9qd$1@dont-email.me:
>>>>
>>>>> ... just curious .. who's the 3rd party independent analysis done
>>>>> by?
>>>
>>>
>>>> I'm not going to play semantics. What I said stands.
>>>
>>> You said it .. I was just asking who you were talking about...
>>> don't you know?
>>
>> Yep. I know. Jenn, the Malwarebytes software is routinely tested by virus
>> scanners when people submit the executable; Like you did with David
>> Lipmans program. That is independent, 3rd party. [g] A clean bill of
>> health is always provided.
>
>
> That answer is inadequate and does not answer the original question.
It seems adequate to me, and additionally there are people out there
who tear apart security related programs just to see what weaknesses
there are in them - "Little Willy" and Tegam comes to mind.
It is not at all likely that malicious activity will go unnoticed.
A trap door is more likely, but even that is not that likely.


Reply With Quote